Preferred Language
Articles
/
_BdkL48BVTCNdQwCk13t
Applied Minimized Matrix Size Algorithm on the Transformed Images by DCT and DWT used for Image Compression
...Show More Authors

Crossref
View Publication
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Gap-Filling Restoration Methods for ETM+ Sensor Images
...Show More Authors

Enhanced Thematic Mapper Plus (ETM+) onboard the Landsat-7 remotely sensor satellite was launched on 15 April 1999. On May 31, 2003, image acquisition via the ETM+ was greatly impacted by the failure of the system’s Scan Line Corrector (SLC). Consequently, the ETM+ has lost approximately 22% of the data due to the increased scan gap. In this work, several gap-filling methods will be proposed to restore the ETM+ image malfunctions. Some of the proposed methods will be carried by estimating the missed pixel’s values from the same image pixel’s neighborhood, while others will utilize the pixel values extracted from different temporal scene acquired in different time. Mean average filter, median filter, midpoint filter, and several int

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A Modified Advanced Encryption Standard for Color Images
...Show More Authors

     The widespread use of images, especially color images and rapid advancement of computer science, have led to an emphasis on securing these images and defending them against intruders. One of the most popular ways to protect images is to use encryption algorithms that convert data in a way that is not recognized by someone other than the intended user. The Advanced Encryption Standard algorithm (AES) is one of the most protected encryption algorithms. However, due to various types of theoretical and practical assaults, like a statistical attack, differential analysis, and brute force attack, its security is under attack.

In this paper, a modified AES coined as (M-AES) is proposed to improve the efficiency

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
Adaptive Smoothing Technique for Remotely Sensed Images Enhancement
...Show More Authors

Spatial and frequency domain techniques have been adopted in this search. mean
value filter, median filter, gaussian filter. And adaptive technique consists of
duplicated two filters (median and gaussian) to enhance the noisy image. Different
block size of the filter as well as the sholding value have been tried to perform the
enhancement process.

View Publication Preview PDF
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Detecting Keratoconus by Using SVM and Decision Tree Classifiers with the Aid of Image Processing
...Show More Authors

 Researchers used different methods such as image processing and machine learning techniques in addition to medical instruments such as Placido disc, Keratoscopy, Pentacam;to help diagnosing variety of diseases that affect the eye. Our paper aims to detect one of these diseases that affect the cornea, which is Keratoconus. This is done by using image processing techniques and pattern classification methods. Pentacam is the device that is used to detect the cornea’s health; it provides four maps that can distinguish the changes on the surface of the cornea which can be used for Keratoconus detection. In this study, sixteen features were extracted from the four refractive maps along with five readings from the Pentacam software. The

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Publication Date
Thu May 18 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Steganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography

View Publication Preview PDF
Publication Date
Tue Jan 30 2018
Journal Name
Iraqi Journal Of Science
Proposed KDBSCAN Algorithm for Clustering
...Show More Authors

Science, technology and many other fields are use clustering algorithm widely for many applications, this paper presents a new hybrid algorithm called KDBSCAN that work on improving k-mean algorithm and solve two of its
problems, the first problem is number of cluster, when it`s must be entered by user, this problem solved by using DBSCAN algorithm for estimating number of cluster, and the second problem is randomly initial centroid problem that has been dealt with by choosing the centroid in steady method and removing randomly choosing for a better results, this work used DUC 2002 dataset to obtain the results of KDBSCAN algorithm, it`s work in many application fields such as electronics libraries,

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 19 2021
Journal Name
Turkish Journal Of Computer And Mathematics Education (turcomat)
The Impact Of Innovative Matrix Strategy And The Problem Tree Strategy On The Mathematical Proficiency Of Intermediate Grade Female Students
...Show More Authors

The research aims to know the impact of the innovative matrix strategy and the problem tree strategy in teaching mathematics to intermediate grade female students on mathematical proficiency. To achieve the research objectives, an experimental approach and a quasi-experimental design were used for two equivalent experimental groups. The first is studied according to the innovative matrix strategy, the second group is studied according to the problem tree strategy. The research sample consisted of (32) female students of the first intermediate grade, who were intentionally chosen after ensuring their equivalence, taking into several factors, most notably (chronological age, previous achievement, and intelligence test). The research tools con

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Science
Investigating Particular Representations for Matrix Lie Groups SO(3) and SL(2,₵)
...Show More Authors

A complexified adjoint representations of the complexification Lie algebras associated with the special orthogonal group SO(3) and special linear group SL(2,₵)  have been obtained. A new representation of their tensor product is naturally arisen and computed in details.

View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
The Image of Woman by the Artist Jaber Alwan: احلام عبد الستار شنين
...Show More Authors

The woman represents an existential dualism with the man along history. This existence has been manifested through the history of Art starting from the arts of the old civilizations until modernism. It must be said that the history of Art refers to her presence as an extension for this history in the oriental arts, and the Arab countries including Iraq.  The woman has varying outputs in terms of the content of her presence and the style of presentation. In her characterizations: maternity, fertility, femininity and others. The Iraqi artists adopted these fields among them the artist Jaber Alwan who formulated his style of presentation and its units depending on the feminine presence and his experience in her formal and stylistic fie

... Show More
View Publication Preview PDF
Crossref